Progress on cryptography. 25 years of cryptography in China. Papers of an international workshop on progress on cryptography celebrating Guozhen Xiao’s 70th birthday. With a foreword by Xuejia Lai. (English) Zbl 1058.94001

The Kluwer International Series in Engineering and Computer Science 769. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7986-9/hbk). xiv, 246 p. (2004).

Show indexed articles as search result.

Publisher’s description: Cryptography in Chinese consists of two characters meaning “secret coded”. Thanks to Ch’in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond ”secret coding”. China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao’s former students.
Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao’s former and current students.
The articles of this volume will be reviewed individually.
Indexed articles:
Gong, Guang, Randomness and discrepancy transforms, 1-8 [Zbl 1085.94011]
Bai, Enjian; Zhang, Bin, Legendre sequences and modified Jacobi sequences, 9-16 [Zbl 1085.94010]
Huang, Zhenjie; Wang, Yumin, Blind signature schemes based on GOST signature, 13-128 [Zbl 1083.94514]
Wen, Qiaoyan; Zhang, Jie, Resilient functions with good cryptographic properties, 17-23 [Zbl 1085.94016]
Wu, Chuankun, Differential factoring for integers, 25-32 [Zbl 1082.11080]
Ding, Cunsheng; Tian, Xiaojian; Wang, Xuesong, Simple and efficient systematic A-codes from error correcting codes, 33-43 [Zbl 1085.94018]
Li, Bao; Dai, Zongduo, On coefficients of binary expressions of integer sums, 45-52 [Zbl 1152.11304]
Zhang, Zhang; Dong, Qingkuan; Cai, Mian, A new publicly verifiable proxy signcryption scheme, 53-57 [Zbl 1084.94517]
Zhang, Fangguo; Safavi-Naini, Reihaneh; Lin, Chih-Yin, Some new proxy signature schemes from pairings, 59-66 [Zbl 1084.94521]
Du, Weizhang; Chen, Kefei, Construction of digital signature schemes based on discrete logarithm problem, 67-71 [Zbl 1084.94518]
Qiu, Weidong, How to construct DLP-based blind signatures and their application in E-cash systems, 73-80 [Zbl 1084.94520]
Chen, Weidong; Feng, Dengguo, A group of threshold group-signature schemes with privilege subsets, 81-88 [Zbl 1083.94531]
Fu, Xiaotong; Xu, Chunxiang, A new group signature scheme with unlimited group size, 89-96 [Zbl 1081.94549]
Xiu, Weidong; Chen, Kefei, Identity based signature scheme based on quadratic residues, 97-106 [Zbl 1083.94538]
Wei, Shimin, A new digital signature scheme based on factoring and discrete logarithms, 107-111 [Zbl 1083.94523]
Li, Zichen; Zhang, Juanmei; Zheng, Dong, New transitive signature scheme based on discreted logarithm problem, 113-122 [Zbl 1083.94535]
Zhang, Qiupu; Guo, Baoan, One-off blind public key, 129-136 [Zbl 1083.94525]
Feng, Dengguo; Chen, Weidong, Analysis on the two classes of robust threshold key escrow schemes, 137-144 [Zbl 1083.94513]
Gan, Zhi; Li, Qiang; Chen, Kefei, Privacy-preserving approximately equation solving over reals, 145-150 [Zbl 1085.68530]
Lu, Haining; Gu, Dawu, An authenticated key agreement protocol resistant to DoS attack, 151-156 [Zbl 1083.94014]
Zheng, Dong; Chen, Kefei; He, Liangsheng, A comment on a multi-signature scheme, 157-160 [Zbl 1083.94020]
Zheng, Dong; Liu, Shengli; Chen, Kefei, Cryptanalysis of LKK proxy signature, 161-164 [Zbl 1084.94522]
Liu, Shengli; Dong, Zheng; Chen, Kefei, Attack on identity-based broadcasting encryption schemes, 165-172 [Zbl 1084.94516]
Wu, Wenling; Feng, Dengguo, Differential-linear cryptanalysis of Camellia, 173-180 [Zbl 1081.94542]
Zhu, Huafei; Liao, Yongjian, A remedy of Zhu-Lee-Deng’s public key cryptosystem, 187-194 [Zbl 1083.94526]
Zhou, Nanrun; Zeng, Guihua, Quantum cryptographic algorithm for classical binary information, 195-200 [Zbl 1077.81512]


94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
94A62 Authentication, digital signatures and secret sharing
68P25 Data encryption (aspects in computer science)
68-06 Proceedings, conferences, collections, etc. pertaining to computer science
00B25 Proceedings of conferences of miscellaneous specific interest

Biographic References:

Xiao, Guozhen